Cyber Insecurity: Report Finds Majority of Enterprises Expect an Imminent Cyber Attack
- Only one-third of CEOs and less than a quarter of other senior leaders are heavily involved in cyber preparedness initiatives
- Confusion between ITOps and SecOps teams regarding roles and responsibilities
- 61% of respondents believe data loss is likely to occur within the next 12 months
- Data exfiltration attacks occur almost 50% more often than encryption attacks
- Most organizations have limited automation for key functions
- Lack of executive engagement in cyber preparedness initiatives
- Confusion between ITOps and SecOps teams
- Data loss concerns
- Limited automation for key functions
While boardroom alarms ring louder, the C-Suite's involvement in cyber preparedness is often still notably absent
In this report, IDC surveyed more than 500 security and IT operations leaders worldwide to get a current view of how organizations are perceiving modern security threats and approaching cyber resilience. Many of the key findings of this report can be broken down into three areas: C-level engagement in cyber preparedness initiatives; fears around data loss and vulnerable workloads; and the need for automation.
Cyber resilience starts in the C-suite – or does it?
The research shows that in many cases, senior executives/line-of-business leaders are minimally engaged in their company's cyber preparedness initiatives — only one-third (
In addition to a lack of executive engagement, there is also often confusion between ITOps and SecOps teams in terms of who is doing what when it comes to cyber preparedness. Only
According to IDC, business leaders need to play a key role in ensuring companies prioritize cyber preparedness. Additionally, organizations must ensure there is complete alignment between ITOps and SecOps teams as not doing so can make organizations more prone to successful attacks or lengthy recoveries.
Data loss is a big concern, and some workloads are more vulnerable than others
Sixty-one percent of respondents believe that data loss within the next 12 months is "likely" to "highly likely" to occur due to increasingly sophisticated attacks. Of the respondents surveyed, on-premises workloads were thought to be more vulnerable than cloud workloads. On a scale of 1-5, with 5 being highly vulnerable, respondents rated on-premises data repositories a 2.8 and physical workloads a 2.77 – higher than that of cloud workloads (2.67).
Data exfiltration remains the preferred tactic, and manual detection processes are falling short
The research also shows that data exfiltration attacks – when malware or a malicious actor carries out an unauthorized data transfer – occur almost
Additionally, as cyber attackers deploy more clever tactics, relying on manual detection and reporting processes are very likely to result in missed anomalies and successful attacks. A potential solution – automation – could lead to faster detection to mitigate the intrusion impact. However, most organizations (
"Cyber attackers never rest and are constantly discovering ways to exploit vulnerabilities. A truly effective cyber resilience strategy must go beyond just backup and recovery. It's crucial that organizations adopt a new approach that spans prevention, mitigation, and recovery," said Phil Goodwin, Research Vice President, Infrastructure Systems, Platforms and Technologies Group, IDC. "Whether on-premises, in the cloud, or in a hybrid environment, they must integrate multiple layers of defense. With AI now a tool for both defense and offense, the urgency for comprehensive cyber resilience has never been more evident."
"We are beyond just reacting to cyber threats. The C-suite must ensure teams are prioritizing proactive defense, real-time threat intelligence, and robust risk management to pave the way for genuine cyber resilience," said Javier Dominguez, CISO, Commvault. "It's also critical that SecOps and ITOps teams work closely together to look holistically at their security posture, end-to-end. With Commvault, resilience isn't an afterthought – it's the blueprint."
To review the full survey results, visit https://www.commvault.com/idc-whitepaper-the-cyber-resilient-organization.
Methodology
Commvault sought to learn how organizations are approaching cyber resilience, what gaps in cyber responses are common, and best-practices as learned and described by senior IT professionals. To facilitate this research, Commvault commissioned IDC to conduct an independent effort in finding answers to these important issues.
The research methodology used by IDC involved the most comprehensive methodology possible, involving all three primary research methodologies: focus group of eight IT leaders of major US companies (several multinationals) with CIO, CTO, and CISO titles; individual in-depth interviews of other CIOs; and a worldwide survey of senior IT and security professionals with an n = 513.
About Commvault
Commvault (NASDAQ: CVLT) is a global leader in cloud data protection. Our industry-leading platform redefines the next generation of data protection as the only solution with comprehensive data protection, proactive data defense, advanced ransomware protection, and a single view across all your data. This lets you secure, defend, and recover your data, applications, and production workloads – on-premises, in the cloud, over SaaS, or spread across hybrid and multi-cloud environments. The result is early warning of attacks, active defense to reduce the impact of intrusion, and rapid, accurate recovery of your data. Simply put, Commvault is data, protected. For over 25 years, more than 100,000 organizations have relied on Commvault to keep their data secure and ready to drive business growth. Learn more at www.commvault.com or follow us @Commvault.
View original content to download multimedia:https://www.prnewswire.com/news-releases/cyber-insecurity-report-finds-majority-of-enterprises-expect-an-imminent-cyber-attack-301957114.html
SOURCE COMMVAULT
FAQ
What is the involvement of senior executives in cyber preparedness initiatives?
What are the concerns regarding data loss?
What are the most common types of cyber attacks?
What percentage of organizations have limited automation for key functions?